Sciweavers

53 search results - page 1 / 11
» crypto 2000
Sort
View
110
Voted
CRYPTO
2000
Springer
121views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
John Black, Phillip Rogaway
92
Voted
CRYPTO
2000
Springer
99views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
Timed Commitments
Dan Boneh, Moni Naor
82
Voted
CRYPTO
2000
Springer
81views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
Optimistic Fair Secure Computation
Christian Cachin, Jan Camenisch
104
Voted
CRYPTO
2000
Springer
141views Cryptology» more  CRYPTO 2000»
15 years 6 months ago
Differential Fault Attacks on Elliptic Curve Cryptosystems
Ingrid Biehl, Bernd Meyer, Volker Müller
105
Voted
CRYPTO
2000
Springer
129views Cryptology» more  CRYPTO 2000»
15 years 7 months ago
Weaknesses in the SL2(IFs2) Hashing Scheme
Rainer Steinwandt, Markus Grassl, Willi Geiselmann...